1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
3 years ago
6

The Hazard Communication Standard, commonly called the “Right-to-Know” law, gives you the right to know what information?

Computers and Technology
2 answers:
AlladinOne [14]3 years ago
7 0
The answer to your question is D, OSHA requires employers to let employees of any hazardous chemicals exposed,or not.
mariarad [96]3 years ago
3 0

Answer: (B) Every hazardous chemical that you may be exposed to at work

Explanation:

 The communication standard of hazard is generally known as the "right to know" with regards to the united states working environment and network natural law.

 It is the lawful rule in which the individual has the option to know the synthetics to which they might be uncovered in their day by day living. It is epitomized in government law in united states just as in nearby laws in a few states. This law provide the specific information that the every hazardous chemical are get exposed at the work.

Therefore, Option (B) is correct.

You might be interested in
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
When you need to switch on an electrical current at a remote location, would you use a relay or an amplifier?
ahrayia [7]

Answer:

Relay

Explanation:

They both perform similar functions in terms of control of voltage and current but the relay would be better because although it cannot produce a variable output like that of an amplifier, it has the capacity to isolate its input from its output.

7 0
3 years ago
Write a programe to add two numbers using function with return type"void".
Grace [21]

Answer:

#include<iostream>

using namespace std;

//create the function which add two number

void addTwoNumber(int num_1,int num_2)

{

   int result = num_1 + num_2;  //adding

   

   cout<<"The output is:"<<result<<endl;  //display on the screen

}

//main function

int main(){

   //calling the function

   addTwoNumber(3,6);

   return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

then, create the function which adds two numbers. Its return type is void, it means the function return nothing and the function takes two integer parameters.

then, use the addition operation '+' in the programming to add the numbers and store the result in the variable and display the result.

create the main function for testing the function.

call the function with two arguments 3 and 6.

then, the program copies the argument value into the define function parameters and then the program start executing the function.

6 0
4 years ago
The program that is BEST suited
Troyanec [42]

Answer:

everything

Explanation:

cuz I use everything and they all work good

6 0
3 years ago
Multiple Choice
earnstyle [38]
1 )  B ) I<span>ntersections.
2 ) A ) Freeways ( i believe )
Matchmaking
-</span><span>Retractable STOP sign arm ( school bus ) 
-Jaywalking ( d</span><span>angerous pedestrian practice ) 
- Moped ( </span><span>cross between bicycle and motorcyble ) 
1 ) I would say the </span><span>major cause of collisions between cars and motorcycles is due to motorcycles driving into lane/places cars can not get into. - lane splitting, traffic jam - 
2 )When there is a yeild sign or a crossing sign, it's </span><span>legal for a pedestrian to cross a roadway. ( I believe )
3)</span><span> Motorists must keep a constant lookout for pedestrians crossing and at intersections. 
4) I know when trucks are driving up or anything similar they get faster and sometimes cant control, so there are certian stops that trucks go up to make them slow down. I honeslty don't know if you should go around or not. But i hope this helps.
</span>
7 0
3 years ago
Other questions:
  • Artemisia gentileschi used directional line brilliantly in her painting judith decapitating holofernes to draw our attention to
    12·1 answer
  • Can you give me a long list of old kid's cartoons
    8·1 answer
  • Write a function that finds the number of occurrences of a specified character in the string using the following header: def cou
    9·1 answer
  • Ith what frequency do balance changes happen in the game?​
    11·2 answers
  • Multisensory input/output devices, such as data gloves or jumpsuits, are commonly used with _______________ systems.
    12·1 answer
  • Karel challenges answers
    11·1 answer
  • How can I record Tv shows on the Android OTT TV BOX either on the Box or on Kodiak without buying a Tv Tuner?
    12·2 answers
  • If you were an architect planning on building a large scale Municipal complex what type of engineer would you identify as essent
    10·1 answer
  • What is the output?
    11·2 answers
  • Consider the following method, which is intended to return the number of local maximum values in an array Local maximum values a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!